Preventing jamming attack by combining cryptography
1. Presented by
Anusha H N
Avinasha H N
Niha Noorain
Syed Musthak K S
Under the guidance of
Mrs. Shylaja L.N., B.E., M.Tech.
Associate Professor
Department of Information Science and Engineering
3.
To prevent the selective jamming attack by
combining three cryptographic primitives such as
strong hiding commitment scheme, cryptographic
puzzle hiding scheme and all-or-nothing
transformations scheme.
3
Aim
4.
Project show that selective jamming attacks can be
launched by performing real time packet
classification at the physical layer.
To mitigate these attacks, proposed project develop
three schemes that prevent real-time packet
classification by combining cryptographic primitives
with physical-layer attributes.
4
Scope
5.
Strong Hiding Commitment Scheme (SHCS),
Cryptographic Puzzle Hiding Scheme(CPHS) and
All-Or-Nothing Transformation (AONT) scheme.
This project analyze the security of methods and
evaluate their computational and communication
overhead.
5
Contd…
6.
To prevent the selective jamming attack.
To avoid packet dropouts due to collisions between
neighboring nodes.
To show that a selective jammer can significantly
impact performance with very low effort on network
protocol such as TCP and routing.
To secure the packet transmission in wireless
networks.
Objectives
6
7.
“Coping with a Smart Jammer in Wireless
Networks: A Stackelberg Game Approach”[2013]
-Dejun Yang
Technique used: Power Control Smart Jammer game.
Drawback: Jammer improves its utility in
UNAWARE condition.
7
Literature Survey
8.
“Denial of Service Attacks in Wireless Network: The
Case of Jammer”.[2011]
-Konstantinos Pelechrinis
Technique used: Intrusion Detection Scheme(IDS)
used to detect the attack.
Intrusion Prevention System(IPS) used to prevent
the attack.
8
Contd…
9.
“Detection of Jamming Attacks in Wireless Ad Hoc
Networks using Error Distribution”.[2009]
-Ali Hamieh
Technique used: detection by correlation to detect
the jammer.
Drawback: to detect the jamming attack dependency
measure is needed from all nodes.
There is no technique to prevent selective jamming
attack
9
Contd…
10.
“Effects of Denial-of-Sleep attacks on Wireless Sensor
Network mac protocols”.[2009]
-David R. Raymond
Technique used: jamming identification & mitigation,
anti-reply protection
Drawback: Transmitted message from a node can easily
read by attacker because message is not encrypted.
Attacker can access any node using received message as a
authorized and make busy state such attacks are selective
jamming attack.
10
Contd…
11.
“JAMMING”
How does it happen?
Realization of selective
jamming attack
11
Fig.1: Jamming Attack
13.
Proposing a strong hiding commitment scheme
(SHCS), which is based on symmetric cryptography.
The main motivation is to satisfy the strong hiding
property while keeping the computation and
communication overhead to a minimum.
13
SHCS
14.
Presenting a packet hiding scheme based on
cryptographic puzzles. The main idea behind such
puzzles is to force the recipient of a puzzle execute a
pre-defined set of computations before he is able to
extract a secret of interest.
14
CPHS
15.
Here proposed project send a sequence of pseudo
messages corresponding to original messages. The
jammer cannot perform packet classification until all
pseudo messages corresponding to the original
packet have been received and the inverse
transformation has been applied.
15
AONT
16.
The Selective Jamming attack will be avoided and the
packets will be transmitted safely to the proper
destination
16
Expected Result
17.
1. M. Strasser, C. Po ¨pper, and S. Capkun, “Efficient
Uncoordinated fhss Anti-Jamming Communication,”
Proc. ACM Int’l Symp. Mobile Ad Hoc Networking and
Computing (MobiHoc), pp. 207-218, 2009.
2. P. Tague, M. Li, and R. Poovendran, “Mitigation of
Control Channel Jamming under Node Capture
Attacks,” IEEE Trans. Mobile Computing, vol. 8, no. 9,
pp. 1221-1234, Sept. 2009.
3. B. Thapa, G. Noubir, R. Rajaramanand, and B. Sheng,
“On the Robustness of IEEE802.11 Rate Adaptation
Algorithms against Smart Jamming,” Proc. ACM Conf.
Wireless Network Security (WiSec), 2011.
References
17
18.
Gantt Chart - Schedule for carrying different
actvities during project work
18